Jump to content
Nytro

Security bookmarks

Recommended Posts

Penetration Testing

 

OffSec

 

Penetration Testing with Kali - Online Security Training
Offensive Security Student Support
Offensive Security Forums
Exploits Database by Offensive Security

 

Windows Privilege Escalation

 

Checklists/Windows-Privilege-Escalation.md at master · netbiosX/Checklists
Windows Privilege Escalation - a cheatsheet | Tim Arneaud
OSCP - Windows Priviledge Escalation | Hacking and security
FuzzySecurity | Windows Privilege Escalation Fundamentals
Privilege Escalation | To Shell And Back: Adventures In Pentesting

 

Cheat Sheets

 

Spawning a TTY Shell
MSFVennom cheat sheet
Msfvenom Cheat Sheet – Security-Geek
Path Traversal Cheat Sheet: Linux — GracefulSecurity
Path Traversal Cheat Sheet: Windows — GracefulSecurity
Reverse Shell Cheat Sheet | pentestmonkey
How to Bypassing Filter to Traversal Attacks ? | Hacking & Tricks
Local Linux Enumeration & Privilege Escalation Cheatsheet – Rebootuser
Escape From SHELLcatraz - Breaking Out of Restricted Unix Shells - Speaker Deck
Common Web-services · Security - My notepad
Nmap Cheat Sheet
Luke’s Ultimate OSCP Guide: Part 3 — Practical hacking tips and tricks
Penetration Testing Methodology - 0DAYsecurity.com
OSCP-Survival-Guide.pdf

SQLinjection

 

Login Bypass Using SQL Injection
Hacking website using SQL Injection -step by step guide – Ethical Hacking Tutorials | Learn How to Hack | Hacking Tricks | Penetration Testing Lab
Vulnhub – Kioptrix: Level 1.2 (#3) – Guillermo Cura

 

Enumeration Visualized Wiki

 

Guides

 

OSCP · Teck_k2
Offensive Security's Complete Guide to Alpha
how-to-oscp-final.md
Loot and Enumerate · Security - My notepad
Offensive Security's PWB and OSCP - My Experience - Security SiftSecurity Sift
Jack Hacks
Interesting Local File Inclusion method | DiabloHorn
ferreirasc/oscp: oscp study
Offensive Security Certified Professional (OSCP) Review - Jim Wilbur's Blog
Passing OSCP - scund00r
BlackWinter Security | Code and Stuff

 

Linux Privilege Escalation

 

Linux Privilege Escalation by Exploiting Cronjobs
Basic Linux Privilege Escalation

 

Pentest Practice Links

 

Penetration test lab "Test lab" | Pentestit
CTF365 - Capture The Flag | Security Training Platform
[PentesterLab] PentesterLab Pro
Mainsequence - Exploit Exercises
OverTheWire: Natas Level 0
Welcome [Root Me : Hacking and Information Security learning platform]
Hack The Box :: Penetration Testing Labs
Hack The Box :: Forums
Vulnerable By Design ~ VulnHub

 

PentesterAcademy

 

Pentester Academy: Learn Pentesting Online
AttackDefense Labs: Pentester Academy

 

Bug Bounty

 

HackerOne

 

Hacker101 CTF
Hacker101 | HackerOne Platform Documentation

 

Synack

 

Synack - Dashboard
Synack Onboarding

 

Learn to hack and collaborate with other security researchers on bug bounties | BugBountyNotes.com GitHub - jhaddix/tbhm: The Bug Hunters Methodology Tomnomnom Vim Tutorial - Knowledge Base Assetnote Wordlists

 

Penetration Testing with Kali - Online Security Training Offensive Security Student Support Offensive Security - Purchase Page Offensive Security - Exam Scheduling Link Exploits Database by Offensive Security Offensive Security Forums Hack The Box :: Penetration Testing Labs Hack The Box :: Forums IppSec - YouTube Vulnerable By Design ~ VulnHub codingo/Reconnoitre: A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing. Scripts/Enumeration.py at master · MistSpark/Scripts · GitHub

Pentesting Links

 

Penetration test lab "Test lab" | Pentestit
CTF365 - Capture The Flag | Security Training Platform
[PentesterLab] PentesterLab Pro
Mainsequence - Exploit Exercises
OverTheWire: Natas Level 0
Welcome [Root Me : Hacking and Information Security learning platform]

 

Pentester Academy: Learn Pentesting Online AttackDefense Labs: Pentester Academy Attify Store - Offensive IoT Exploitation | Attify Store Flex Center // Infosec Skills :: Home

 

Reverse Engineering

 

GREM

 

IT and Information Security Cheat Sheets
GIAC GREM Certification | Reverse Engineering Malware
Cheat Sheet for Analyzing Malicious Software

Reading

 

The_Evolution_of_TDL.pdf
Detecting DNS Tunneling
Two's Complement

 

 

VirusTotal Learn to Develop with Microsoft Developer Network | MSDN GitHub - ytisf/theZoo: A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public. MalwareTech - Life of a Malware Analyst The “Ultimate”Anti-Debugging Reference DEF CON CHINA Reverse Engineering challenges

ARM

 

Writing ARM Assembly (Part 1) | Azeria Labs

 

Hardware

 

FCC OET Authorization Search
IoT Firmware Exploitation Online
Practical Reverse Engineering Part 1 - Hunting for Debug Ports · Hack The World
Intro to Hardware Hacking - Dumping your First Firmware
IoT Hacking Tools | Attify Store
Electronics – /dev/ttyS0
Extracting Flash Memory over SPI | GracefulSecurity
NAND Flash Data Recovery Cookbook
Centrifuge Platform® | Firmware Security Analysis | ReFirm Labs
Binwalk Pro

 

Network Protocols

 

Reverse Engineering Network Protocols - Jack Hacks

 

hasherezade (hasherezade) Hasherezade's projects

SDR Hacking

 

Signal Identification Wiki

 

The Cryptopals Crypto Challenges

 

ExploitDev

 

Corelan

 

..:: Corelan Team | Peter Van Eeckhoutte (corelanc0d3r) ::..
Exploit writing tutorial part 1 : Stack Based Overflows | Corelan Team
Exploit writing tutorial part 2 : Stack Based Overflows – jumping to shellcode | Corelan Team
Exploit writing tutorial part 3 : SEH Based Exploits | Corelan Team
Exploit writing tutorial part 3b : SEH Based Exploits – just another example | Corelan Team
Exploit writing tutorial part 4 : From Exploit to Metasploit – The basics | Corelan Team
Exploit writing tutorial part 5 : How debugger modules & plugins can speed up basic exploit development | Corelan Team
Exploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR | Corelan Team
Exploit writing tutorial part 7 : Unicode – from 0x00410041 to calc | Corelan Team
Exploit writing tutorial part 8 : Win32 Egg Hunting | Corelan Team
Exploit writing tutorial part 9 : Introduction to Win32 shellcoding | Corelan Team

 

Reverse Engineering and Binary Exploitation Series | PWNTHEBOX! FuzzySecurity | Tutorials

ARM

 

Products
GitHub - Billy-Ellis/Exploit-Challenges: A collection of vulnerable ARM binaries for practicing exploit development
Writing ARM Assembly (Part 1) | Azeria Labs
Search [Root Me : Hacking and Information Security learning platform]
Corellium
arm_exploitation/exploitation_on_arm_based_systems.pdf at master · sashs/arm_exploitation
15/85 Security
ROP on ARM with radare2
Microsoft Word - ARM paperF.docx

 

OSCE

 

Offensive Security’s CTP & OSCE Review - Jack Hacks
OSCE/CTP Prep Guide – Tulpa Security
mona.py – the manual | Corelan Team
Resources for OSCE
CTP/OSCE Prep – Wrapping Up Our Prep - The Human Machine Interface
h0mbre/CTP-OSCE: Scripts I used during CTP
jtpereyda/boofuzz: A fork and successor of the Sulley Fuzzing Framework
Study Guide & Tips: Offensive Security Certified Expert (OSCE) / Cracking The Perimeter (CTP) - Amin Bohio
phra's blog ~ Technical posts about InfoSec
abatchy's blog | OSCE Study Plan
Upgrade from LFI to RCE via PHP Sessions - RCE Security
Taking_Back_Netcat.pdf
OSCE Review (CTP Course) - Everything S3curity

 

The Human Machine Interface h0mbre/Learning-C: A series of mini-projects used to learn C for beginners metasploit-payloads/c/meterpreter/workspace at master · rapid7/metasploit-payloads

Linux Exploitation

 

xairy/linux-kernel-exploitation: A collection of links related to Linux kernel exploitation

 

OSEE

 

awe_syllabus_2018
OSEE - AWEstralia 2018 preparations | www.jollyfrogs.com
timip/OSEE: OSEE Preparation
Common WinDbg Commands (Thematically Grouped)
Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment - rootkit
abatchy's blog | Tutorials

 

IoT Hardware

 

IoT Firmware Exploitation Online | Registration

 

The best resources for learning exploit development – Fabio Baroni Backdooring PE Files with Shellcode - Red Teaming Experiments

Windows Exploitation

 

Ricerca Security: "I'll ask your body": SMBGhost…
SMBleedingGhost Writeup: Chaining SMBleed (CVE-20…
Windows Internals & Software Drivers – OSR
What is this? - Red Teaming Experiments

 

 

Qemu

 

Installing Qemu for Windows [E-Maculation wiki]
Qemu package and guide for Windows available • E-Maculation Forum
Index of /lubuntu/releases/16.04/release
Building PPC Linux code using QEMU on Ubuntu 18.04 LTS
Debian Ports
Qemu - Google Drive
hugsy/cemu: Cheap EMUlator: lightweight multi-architecture assembly playground

 

Microcontrollers and SDRs

 

Nyan Sat - Satellite Communications Challenge - Chapter 0

 

GNURadio

 

GNU Radio
Tutorials - GNU Radio

 

Embedded Programming

 

FastBit Embedded Brain Academy | Works on Firmware and Embedded Engineering | Udemy

 

WebSecAcademy

 

Web Security Academy: Free Online Training from PortSwigger
 
Sursa: https://x0rb3l.github.io/Cyber-Bookmarks/bookmarks.html
  • Thanks 1
  • Upvote 2
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...